Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.


  1. Advanced Patent Search
Publication numberUS3896266 A
Publication typeGrant
Publication dateJul 22, 1975
Filing dateJun 2, 1972
Priority dateAug 9, 1971
Also published asCA977457A1, DE2239524A1
Publication numberUS 3896266 A, US 3896266A, US-A-3896266, US3896266 A, US3896266A
InventorsNelson J Waterbury
Original AssigneeNelson J Waterbury
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Credit and other security cards and card utilization systems therefore
US 3896266 A
Abstract  available in
Previous page
Next page
Claims  available in
Description  (OCR text may contain errors)

United States Patent [19;

Waterbury [63] Continuation-impart of Ser. No. 169,906, Aug. 9,

1971, Pat. No, 3,752,904.

[76} Inventor:

[52] US. Cl 179/1 SB [51] Int. Cl. G101 H04 [58] Field of Search 179]] SA, 1 SB, 2 DP;

340/149 R, 149 A, 152; 235/6l.7 B

[56] References Cited UNITED STATES PATENTS 2,416,353 2/1947 Shiprnan 179/1 VS 3,412,493 11/1968 French 235/617 B 3,466,394 9/1969 French 179/1 SB 3,525,811 8/1970 Trice i 1. 179/1 SB 3,559,175 l/l97l Pomeroy 340/152 R 3,594,727 7/1971 Braun..... 340/152 R 3,673,331 6/1972 Hair 1 179/1 SB 3,688,088 8/1972 Brown 235/61.7 B

3,700,815 10/1972 Doddington 179/1 SA 3,723,655 3/1973 Zucker 235/6l.7 B 3,742,451 6/1973 Graham 179/1 SB Primary Examiner-William C. Cooper Attorney, Agent, or FirmSherman & Shalloway [57] ABSTRACT A security card (which may be a credit card) according to the invention has recorded on it data identifying a personal and non-counterfeitable attribute, such as [451 July 22, 1975 the voice characteristics, of the authorised holder of the card. A card utilisation system according to the invention provides means for comparing the attribute as recorded by these data with the corresponding attri bute of the person wishing to use the card, thereby substantially eliminating the possibility of unauthorised use of the card. The utilisation system, when applied to credit card utilisation, preferably includes document facsimile transmission. whereby, for example, a credit card user obtaining credit remotely can be provided with a facsimile copy of the usual credit sale document, which facsimile copy he signs before transmitting another facsimile copy, this time of the signed first copy, to provide the remote credit issuing location with his authentication of the transaction. Preferably, also, the system includes provision for tele vision communication between credit card holders and the credit-giving locations, whereby, for example, a remote would-be purchaster can be shown goods in which he is interested. The system is also adapted to provide for credit card payment in, for example, pay television distribution systems and for remote pur chase of theatre and airline tickets and of services such as the supply of information from computerised information systems and computerised translation services. lndividual human voices embody characteristics which are unique and identifiable. A credit card can, therefore, be equipped with a voiceprint-cipher, which can be used to corroborate authorised possession by the card-holder. Contour-lines or numerically coded representations can be used to embody the voice-print information on the credit card, and electronic com parators can be used for automatic verification of identity. The voice cipher can be combined with a charge account code cipher, to provide further protection of the integrity of a credit card.





BACKGROUND OF THE INVENTION 1. FIELD OF THE INVENTION This invention relates generally to the verification of personal cards identifiable with individual persons, hereinafter referred to generally as security cards". Security cards include inter alia cards issued in connection with particular credit systems and referred to herein as credit cards. The invention is generally concerned with credit and other security cards and with utilisation systems for such cards. Use is made of an uncounterfeitable attribute of the card holder such as his voice characteristics. The invention therefore relies inter alia on automatic speech analysis, voice feature extraction and feature comparison systems and methods. In a major aspect, the invention is concerned more particularly but not exclusively, with a system and a method for the verification of a credit card by comparing features of the card-holders voice with an utterance-cipher recorded on the credit card.

2. DESCRIPTION OF THE PRIOR ART Fraudulent use of credit cards by unauthorised persons annually causes substantial financial loss and inconvenience to companies as well as to the individuals whose cards may be lost or stolen. There are many and elaborate kinds of fraud, and most of these are subject to the ability of the impostor to pass as the authorised owner of the card. conventionally, verification of ownership is based on the card-holder's signature. This signature is, of course, visible to an impostor. Although an expert would be capable of spotting a forged signature without much difficulty, the average person, e.g. the shop assistant or the petrol station attendant, would not be likely to detect a forged signature. Automatic feature comparison for machine-verification of a validation signature presents considerable technical obstacles, and is not regarded as a practical proposition.

Verification by methods less subject to impersona tion of forging, and more suitable for automatic verification by means of a machine, is therefore desirable. A number of techniques exist which facilitate the embodiment of a system and method to achieve this aim. These are described in the following paragraphs.

Systems have been proposed for Automatic Talker Identification, whereby features are extracted from the uttered speech of a person and used for verification of this speaker's identity.

L. G. Kersta has described in the journal: Nature a method of Voiceprint Identification by which people can be identified from a spectrographic examination of their vocal utterances Ref. 1 L. G. Kersta Voiceprint Identification" Nature, No. 4861 (Dec. 29th, 1962), pp 1253-1257. Kersta used two types of "Voice-print", one for the subjective determination of speaker identity and the other for the automated classification of known speakers. Voice prints are thus seen to be graphic representations of certain characteristic properties of speech or speech segments, uttered by an individual. These voice prints are produced by means of acoustic analysis instruments such as a sound spectrograph, which has the capacity to translate speech sounds into a visual representation of these sounds. A voice print as described by Kersta exhibits physical dimensions which include time, frequency and loudness. These can be represented in terms of (i) the position along the horizontal axis; (ii) the position along the vertical axis; and (iii) the density of the printed pattern, respectively. The information in the third dimension (loudness) can be represented by means of contour lines instead of by a density pattern. The method described by Kersta is based on the observation that certain features, recognisable in such a voiceprint, are specifically characteristic of an individual, and are not shared with other speakers, even if their voices seem very similar to the unaided listener.

Attempts to disguise the voice, e.g. by whispering or by the speaker holding his nose, do not alter the basic features in a person's voiceprint, and it is believed that each voice is uniquely difi'erent. Voices are therefore identifiable with the kind of accuracy that fingerprint identification offers. The cause of this uniqueness is the mechanism of speech relative to the physical properties of the individual's vocal tract. The parts which principally determine uniqueness are the vocal cavities and the articulators. The major cavities affecting speech are the throat, and the nasal and oral cavities. The contribution of the vocal cavities to voice uniqueness lies in their size and the manner in which they are coupled together. The likelihood of two people having all their vocal cavities of the same size and coupled identically is remote. A still greater factor in determining voice uniqueness is the way in which the articulators are operated during speech. The articulators include the lips, teeth, tongue, soft palate and jaw muscles, whose controlled dynamic interplay results in intelligible speech.

The underlying principle of pattern classification used in automated speaker verification is the prespecification of a set of classes of events or features between which distinguishing characteristics are desired. The following system has been proposed for verification of these voice characteristics. An input is derived from a microphone which feeds into a spectrum analyser. There are many types of spectrum analyser ranging from a channel filter bank which gives spectral information at discrete frequency locations to those which give an accurate harmonic frequency analysis. Realtime analysers are also available. These are heterodyne analysers in which repeated scans are made while signal components are shifted across a fixed band-pass filter. The analysis filter band-width in the voiceprint application is broader than the highest pitch frequency expected, thus giving directly a good approximation of the signal envelope averaged over the effective time constant of the analysing filter.

Another method involves converting the continuously shaded amplitude scale of a voiceprint such as that described by Kersta (loc.cit.) to a quantized scale which may use 3-bit quantization over a 48 dB amplitude range or a higher bit rate for a more sensitive measure of spectral shapes. The quantized measurements can then be used as input data for the feature extraction and subsequent identification process, including computerized pattern matching.

Speaker recognition involves the extraction and recognition of speech features which are unique to the speaker. Two types of speaker recognition should be distinguished from each other:

(i) Speaker Identification This is the determination of the identity of a speaker from one or more utterances of cue words, but without a voluntary disclosure of identity.

(ii) Speaker Verification This is the determination of whether a speaker truthfully identifies himself on the basis of both the cue words and a clue to the identity (or purported identity) of the speaker. Both the identification and the verification processes employ a comparison of encoded features extracted from cue words with a pre-established speech or code reference. The two processes differ in the manner in which the comparison is made. In the case of speaker identification, it is necessary to compare codes derived from the cue words with all the entries in the speaker code file. This procedure, called the non-cooperative search mode can be used in law enforcement applications. Speaker verification requires that codes derived from cue-words should be compared with only those prestored codes corresponding to the purported identity supplied by a speaker who wishes to be identified. This process is called the cooperative search mode. It may be used, for example in a time-share computer system when a user wishes to gain access to proprietary files.

Speech signals contains information describing the word spoken as well as the identity of the speaker. If the identical word is spoken by different speakers, the differences between speakers can be identified more easily; hence, the use of key words, particularly in speaker verification systems. The differences in utterance characteristics which allow the recognition process to become effective can be understood by consideration of the voiceprint described by Kersta (loc. cit. Here, the spectrogram of a brief utterance, e.g. a single word or even just one syllable, is analysed in the frequencytime domain. The spectrogram is divided into grids using small increments of time and small increments of frequency. Thus, a weighted frequency spec' trum can be correlated for each utterance segment. Typically the utterance of a short word may be segmented into ten or more segments along the time axis. Each of the utterance segments will, in turn, be exam ined for its energy distribution along the frequency axis. The resulting pattern which can be mapped or digitized, will be typical, and different, for different speakers, even when the same word is spoken by them.

Different codes and different forms of measurement can be used to distinguish different speakers. James E. Luck has described in The Journal of the Acoustical Society of America cepstral measurements for automatic speech verification Ref. 2 James E. Luck Automatic Speaker Verification Using Cepstral Measurements" Journal Acoust. Society America, Volume 46, Number 4, Part 2 1969), pp. 1026 1032. His automatic speaker-verification system is well suited to demonstrate the uniqueness of voice characteristics. It analyses a specific part of a standard test phrase and takes a few seconds to decide whether the speaker is the person he claims to be or is an impostor. In the con text of the instant invention, the particular interest of this work by James E. Luck (Ref. 2) relates to: (i) the set of measurements he proposes for distinguishing between speakers; (ii) the reference data required to characterise the normal variations in a speaker's voice; and (iii) the verification accuracy obtainable. Speech data for the Luck system are (a) taken from a microphone;

(b) bank-limited; (c) analog-to-digital converted; and (d) stored in a computer memory. The frequency range up to 3 kHz, over which filter gain is virtually flat, is adequate for the recognition process. This feature is significant since recognition over a normal telephone link is often desirable. Storage locations for 8,000 samples of the speech signal are reserved in the computer memory. Thus, at an 8 kHz sampling rate, up to 1 sec of data may be stored at any one time. When a speaker wishes to have his identity verified, he supplies his purported identity to the computer via the teletype. The available reference data for that speaker are then read into the computer from a memory disc on which they have been previously recorded. The speaker then utters the test phrase for analysis and for comparison with the data read off the disc. The criteria used for comparison can be mathematically expressed as vectors in a multidimensional vector space having between 16 and 34 dimensions in the exercise described. Measurement vectors derived from the uttered phrase are compared with reference vectors derived from the disc memory. The euclidian distance between the test vector and the reference vectors is computed. If the distance between the test vector and the closest reference vector is less than, or equal to, a predetermined threshold, the speaker of the test phrase is verified as being the same person as the speaker of the reference samples. Thus, the location of the reference vectors and the threshold level determine a piecewise quadratic boundary that defines the reference-speaker region of the measurement space. Optimum settings of the decision thresholds are then established so that there is an adequate working region within which only impostors are rejected and only the authorised speaker is accepted. Obtaining an adquate set of reference data is conditional upon the effectiveness of the verification system. It is significant that, while an impostor is unlikely to gain acceptance by mimicry, it is a trivial matter for the reference speaker to alter his voice if he wishes to be identified as an impostor. This is an important feature of the verification system, not expected in identification systems where it would be highly undesirable. It is a feature which allows relatively simple verification systems to be devised.

Various pattern matching procedures have been specifically proposed for the comparison of reference samples of speech sounds with test samples for verification. S. Pruzansky Ref. 3 Sandra Pruzansky Pattern Matching Procedure for Automatic Talker Recognition" Journal Acous. Society America, Volume 35, Number 3, (I963) pp 354 358, described the automatic recognition of such speech sounds based only on acoustic information. If the same word is spoken by different speakers, automatic speaker recognition by spectral pattern matching provides a means for identification of a given speaker. Spectral analysis was accomplished by playing back the recordings through a 16 channel filter bank and a special 17th channel which band passed frequencies of from 5 to 7 kHz. The other filters covered the range of from 200 to 4,000 Hz. The output of the filter bank was sampled sequentially by a multiplexer at a rate of samples per second. The samples were quantized into 10 bit binary numbers which were recorded on digital tape. The procedure used for the recognition of talkers consisted in crosscorrelating the single utterances of each word with reference patterns. The talkers utterances were used to form reference patterns. The results of experiments are given for time-frequency-energy patters (threedimensional) and for two-dimensional patterns illuminating the temporal information. The original threedimensional patterns were reduced to energyfrequency arrays containing l7 array points, each point being simply the sum of energy from each of the time sections for that frequency band. With the time dimension eliminated, talkers were corectly recognised for a high percentage of the utterances tested. The long-time frequency spectra of the voices were also investigated, and a reference pattern for each talker was formed by summing up the energy of the voiced speech across a number of different utterances by the same speaker. This considerably reduced the number of patterns to be recognised.

A sophisticated approach has been proposed by Li, Dammann and Chapman Ref. 4. K. P. Li, J. E. Dammann and W. D. Chapman "Experimental Studies in Speaker Verification, Using an Adaptive System Journal of the Acoustical Society of America, Vol. 40, No. S (1966] pp. 966 978, using a two-level, adaptive linear threshold element (L.T.E.) system to perform speaker discriminations, and in particular utterance verification of an expected speaker. Feature extraction and comparison are described including the use of bank pass filters, feature detection, digitizing and deci sion circuitry.

The present invention is based on the appreciation that the characteristics of the human voice which constitute an uncounterfeitable attribute of each individual person, that these techniques can be used to provide systems for recognition or verification of security cards such as credit cards. The invention makes use of the voiceprint and other identification techniques which rely on the recording and analysis of voice characteristies.

In one aspect of the invention, instead of, or in addition to, the signature carried on the credit card, and which has to be reproduced by the user as proof of his identity, the card bears a cipher representing the recorded utterances of a reference phrase, and embodying features characteristic of the users voice. The authorised users voice is the means whereby he identifies himself, its characteristic and unique features being automatically compared with the verification cipher on the card.

The invention further relates to a device for use with a security card, such as a credit card, of the kind re ferred to above, namely a card which carries a record of a voiceprint of the authorised holder of the card, the record being in a form such that it can be read" by suitably transducer means to reproduce the voiceprint in a form in which it can be compared with a voiceprint derived directly from the voice of a person presenting the card to thereby authenticate that persons identity if he is in fact the authorised holder but not otherwise.

According to another aspect of the invention, there is provided a device which will derive a first voiceprint from the voiceprint record on such a card, and will also derive a second voiceprint from the voice of a person speaking to it, and will further compare the first and second voiceprints and give an indication that they are, or are not, voiceprints of one and the same voice.

There are a variety of forms in which such a device can be provided. In one form, the device includes a card transport system.

Instead of, or additional to, a magnetically recorded voice print, the card may bear a visible representation of the voiceprint, and the device according to the invention may incorporate a television-type camera for scanning the voiceprint (and, if desired, other visibly coded information), and providing an electrical signal train representative thereof for comparison with the voiceprint derived directly by means of the micro-- phone.

One situation in which the device according to the invention is useful is at a point of sale, such as 1h; counter of a store, bank, airline ticket office or off track betting office, where there is personal conta;t with someone who has to be convinced of the card holder's identity but will thereafter deal personally with the holder and his card.

A device according to the invention may also, however, be used to enable the card holder to obtain credit remotely. For example, such a device may be provided beside a coin-operated telephone, as a means of male ing telephone calls with a credit card instead of cash payment. The device may for example be connected to the telephone control circuitry and. over the telephone circuits, to the telephone company's accounts department. On presentation to the device of a credit card bearing a voiceprint, and of a speech sample by the user, the device makes a comparison of the voiceprints as described above and, if the comparison proves satis factory, feeds to the telephone control circuitry a signal rendering the telephone operative for use (as though coins had been inserted). The device is arranged to feed, over the telephone circuits to the company's accounts department, cither the voiceprint or other iden tifying information read from the card, whereby the card users telephone account is identified and the telephone call made thereafter by the card user is charged, preferably automatically, to his account as thus identifled,

Objects of the invention include the provision of increased security against misuse of a credit or other security card according to the invention, such for example as a personal identity pass, and simultaneously without sacrificing this increased security, widened facili ties for authorised use of the card, including its use to authenticate the user's identity or to obtain credit at a location remote from that of the card holder, and even on a worldwide basis by making use of an existing or a specially provided international telecommuncations network. Other objections and features of the invention will also become apparent from the following disclosure of the invention.

The basic feature of the invention is the provision of a security card which bears, as data identifying the authorised holder, data relating to characteristics or an attribute which are so personal to the holder, that he, and only he, can use these characteristics or such personal attributes to generate, in a signal transmission system, signals which are transmissible by the transmission system to a remote location and which can then be compared with signals which are generated by means of the identifying data recorded on the card.

The invention, as will be understood, is a system and method for receiving the card holder's utterance of a reference phrase: deriving from this utterance a cipher or voiceprint which can, in suitable form be embodied in the credit card; receiving the credit card at the verification point; deriving a reference signal from the cipher or voiceprint; receiving the utterance of the test phrase spoken by the user at the verification point; effecting a temporary recording of this utterance and/or processing the utterance to derive a test signal therefrom; comparing the test signal with the reference sig nal according to certain criteria so that the authorised users utterance is accepted whereas an impostors utterance is rejected; and producing output command functions depending on the result of the comparison, i.e. on the verification or rejection of the claim to authorised use of the card.

Another object of the invention is the use of the disclosed system and method for verification of caller identity in telephone call boxes equipped for voiceprint or cipher comparison, for the purpose of payment for telephone calls, cables, seat reservations, flight book ings, off-course betting, and so on.

Another use concerns identity cards for purposes other than payment, e.g. military use, admission to clubs and so on.

A further use concerns the automatic recording of the impostors voice as part of the process which, in addition to providing an effective deterrent, can be instrumental to his identification and capture. This feature may well increase the use of credit cards by removing the fear that a credit card lost or stolen should become an easy prey to the petty criminal. It must be remembered that the signature on an ordinary credit card is clearly visible and forgery is not easily spotted by the sales assistant or petrol vendor, for example, because the impostor has an easy opportunity for practising the signature before attempting the fraud. A voiceprint is not vulnerable in this way. In contrast to a written signature, the recorded voice cipher is not readable, and cannot be used without special equipment. Even with the aid of special deciphering apparatus, successful voice imitation is virtually impossible, as unlike handwriting, the voice-print is not amenable to simulation.

It is therefore possible to use the invention in combination with, and to protect from fraud and forgery, such documents as stock certificates, passports, travellers cheques and social security cards which may also be used for voter registration as means of identification at the polling booth.

DESCRIPTION OF THE INVENTION Recognition or verification of authorised ownership of a credit card or other security card is the main objective of the present invention. Such verification is made possible for the rightful owner by for example comparing and identifying features of his voice with the voiceprint contained on the credit card or other document which bears a voiceprint reference cipher.

The verification equipment normally takes the form of a small box with a microphone in a convenient position. The box has a slot into which the credit card can be inserted. Indicators which may take the form of a green and red indicator light, are visibly placed on the box to initiate command functions, i.e. to indicate the completion and the verdict of the verification process. For applications where the credit card verification equipment is used in connection with automatic petrol pumps. telephone credit, automatic money dispensing or other unattended vending operations, an alarm is provided by way of command function, to call remote personnel to take action when an impostor tries to use someone elses credit card, and when this is detected by the voiceprint comparator.

These and other features of the invention will be disclosed in the following description of embodiments of the invention, with reference to the accompanying drawings in which:

FIG. 1 illustrates a credit card which is of known type except that it bears a strip of magnetic recording mate rial on which, though of course, this cannot be illus trated, there is recorded a voiceprint of the authorised holder of the card;

FIG. 2 illustrates a credit card which is similar to that shown in FIG. 1 except that, instead of a magnetic recording of the voiceprint of the authorised holder, it carries a visible representation of such a voiceprint;

FIG. 3 is a schematic diagram of a credit card utilisation system with which a credit card as shown in FIG. I or FIG. 2 may be used;

FIG. 4 is a schematic diagram of a more complex credit card utilisation system with which a credit card as shown in FIG. 1 or FIG. 2 may be used, in secure conditions, to transact business on credit between locations which are remote from one another;

FIG. 5 schematically illustrates a further embodiment of a security card utilisation system according to the invention;

FIGS. 6 and 7 show further modifications;

FIG. 8 is a highly schematic diagram of a card verification system which includes a card transport system.

FIG. 9 is a schematic representation of voiceprint comparing equipment and system for credit card verification.

FIG. 10 is a schematic representation of equipment and method for preparing a special credit card;

FIG. 11 is a schematic representation of verification equipment and method;

FIG. 12 is a schematic representation of simplified equipment for preparing a special credit card; and

FIG. I3 is a schematic representation of simplified verification equipment and method.

The credit card illustrated in FIG. 1 and indicated generally by reference numeral H is of the well-known kind, and may have printed or otherwise recorded thereon all the information concerning the issuing company, the authorised holder, and the credit limit to which use of the card is subject, which such cards customarily bear. Additionally, however, the card 11 is provided on one of its faces with a strip 12 of magnetic recording material on which is recorded a voiceprint of the authorised holder. The voiceprint may be recorded on the strip 12 directly as a sound recording of the voice of the authorised holder as he speaks, say, his name; or, equally satisfactorily, the voiceprint may be in the form of a magnetic record of a signal pulse train which constitutes a coded speech analysis of the speaking voice of the authorised holder as produced by means of a speech analyser prior to being recorded on the strip 12.

The credit card illustrated in FIG. 2, and indicated generally by a reference 11, is also of the well-known kind except that it is provided with a region 12' on which is visibly printed a trace 13 which is a visible record of a voiceprint of the authorised holder of the card. As in the case of FIG. I, the card 11' of FIG. 2 may alternatively have visibly recorded thereon not a voiceprint trace 13 as illustrated but a visible representation of spaced pulses constituting a coded speech analysis of the authorised holder of the card.

It will be understood that the cards 11 and 11' each uniquely identify the authorised holder by means of the voiceprint data recorded when the cards are presented to suitable apparatus for reading these data.

FIG. 3 shows a first, basic, security card utilisation system with which credit cards or other security cards like the card 11 may be used. The system illustrated in FIG. 3 comprises a speech analyser station 14 connected via a public telephone line 15 to its local telephone exchange 16. The station 14 is accessible via the public telephone system to each of a plurality of salespoint locations of which two are shown, indicated by references 17 and 17, respectively. The sales-point location 17 is assumed to be in the same locality as the speech analyser 14 and to be served by the same tele phone exchange 16, to which it is therefore connected by its own telephone line 18. The sales point location 17, identical in form with the location 17 and therefore not shown or described in detail, is assumed to be served by a telephone exchange 16' to which it is connected by a telephone line 19, the telephone exchanges 16 and 16' being connected to one another as shown by a telephone line or other telecommunications link 20 or through intervening telephone exchanges (not shown). Further sales point locations (not shown) are connected, as by a further telephone line 21, to the exchange 16 and are thus each connectable to the speech analyser station 14.

Each sales-point location 17 or 17' and so on is one at which credit or other security cards like that shown in FIG. 1, for example, are recognised; and each is provided with a telephone 22, a card reader 23 and an indicator 24, all connectable through connection circuitry to the telephone line 18, as is illustrated schematically in the case of the location 17. A card holder wishing to use his card at, say, the location 17 uses the utilisation system shown in FIG. 3 as follows. First, he uses the telephone 22 to call the number of the speech analyser station 14, and by this means puts the location 17 in connection with the station 14, through the exchange 16. lf he were at location 17', the connection would be established through the exchanges 16 and 16. Having established the necessary connection, he speaks to the speech analyser station 14 which performs a speech analysis on the received speech. The card holder also presents his card 11 to the card reader 23, which is constructed to scan the strip 12 and to derive therefrom signals representing the data recorded thereon. These signals are also transmitted to the speech analyser. 1f the data are directly in the form of recorded speech, the speech analyser station 14 performs a speech analysis on the reproduced recorded speech as well, and compares the results of the two analyses in any convenient manner. if, on the other hand, the voiceprint is recorded on the card in the form of pulses constituting a coded speech analysis, the analyser station 14 provides a similarly coded analysis of the speech transmitted by the telephone 22 and then compares the two coded analyses. in either case, the analyser station makes the necessary comparison and then, dependent on the result being satisfactory, emits a signal which is transmitted back to the location 17 to actuate or to illuminate the indicator 24 so as to confirm that the person presenting the card is the person whose voiceprint is recorded thereon. The sales personnel at the sales point location 17 can then, with full confidence, permit the card holder to use his card to obtain credit.

it will be understood that, although the locations [7 and 17 have been referred to as sales point locations, this term is intended to include, for example, banks where the credit card holder will not be making a pur chase but merely wishes to draw cash or to effect some other transaction which he can only be permitted to do after having identified himself. Equally, the system may be an internal telephone system of, for example, a security establishment or other organisation to which access is only permitted after proper identification. In that case, the telephone exchange 16 may be the internal exchange of the establishment (within which the speech analyser may be accommodated), and each entrance to the establishment, or to individual parts thereof, may be provided with an identity checkpoint (corresponding to the sales point location 17), at which persons presenting themselves present also not a credit card but a security card corresponding to the credit card as described above with reference to FIG. 1 or FIG. 2.

It is to be understood that, although in the system illustrated in FIG. 3, the speech analyser station 14 is remote from all the sales point locations and is used by all of them in common, it is within the scope of the invention to provide each sales point location with its own analyser, the link to which does not then involve the public telephone system but only a private internal telephone system or, even, a direct connection provided for the credit card utilisation system alone.

It will also be understood that the data recorded on the credit or other security card of FIG. 1 or FIG. 2 for uniquely identifying the authorised holder need not, even assuming that voiceprints are used for this purpose, be either a voiceprint itself or details of the analysis of the voiceprint. Instead, the data recorded on the card may be the access code to a specific location in a computerised memory store containing voiceprint records or analyses of all authorised card holders, the memory store being associated with the speech analyser station 14. When, as described above, the data from a card 11 or 11' are read by a card reader 23 and transmitted to the station 14, the transmitted signals call up the respective memory store location. The memory store then presents the appropriate voiceprint or its analysis for comparison with the analysis at the station 14 which is performed by the speech analyser on the voice of the card holder as transmitted by the telephone 22.

The systems described above with reference to FIG. 3 enable sales or security personnel at any of the locations 17 and so on to verify the identity of a card holder who is actually present at the respective location. Only minor modification or development of the system is required to enable a card holder to obtain credit or to establish his identity on the same reliable basis without being present in person at the sales point location, as, for example, when he wishes to order goods by tele phone. However, it is preferred, when credit is to be obtainable remotely, to provide a more elaborate card utilisation system which not only serves to identify the card holder reliably but also gives him, in turn, the assurance that he will not be overcharged in respect of a purchase which he makes remotedly by use of his credit card.

A suitable system according to the invention is illustrated in FIG. 4. As in FIGv 3, it comprises a sales location point 17 furnished with a card reader 23 (for use in connection with card holders presenting themselves in person), a telephone 22 and an indicator 24, these all being connectable through connection circuitry 25 to the local telephone exchange 16 and therethrough to a speech analyser station 14 of the system. The location 17 of FIG. 4 is additionally furnished with a recording device 26 (which may be a suitable tape recorder), and with a document facsimile transmitter-receiver 27 of any known and suitable kind, thus being connected into the connection circuitry 25.

Each credit card holder who wishes to be able to use his credit card remotely is provided with a card reader 30 and with a facsimile transmitter/receiver 31 (which may be identical in construction with, respectively. the card reader 23 and facsimile transmitter/receiver 27 at each sales point location 17), and also with an acoustic coupler device 32, of known kind, to which the card reader 30 and facsimile machine 31 are connected and by means of which they may be coupled to the credit card holders telephone 33 (or indeed to any telephone), and thus put in connection through an existing telephone system with any one of the sales point locations 17.

The facsimile machine may be of any suitable kind, for example as disclosed in British Pat. No. l,l69,9l2 of Xerox Corporation. Similarly, the acoustic coupler 31 may be of any suitable kind, including that disclosed in British Pat. No. 1,232,734 to the Magnavox Company.

To make and pay for a purchase from a remote sales point location 17, the card holder first uses his telephone 33 to make a call in the normal way to the appropriate sales point location 17. This enables him to hold a normal telephone conversation with a member of the sales personnel there, using the telephone 22. When a purchase has been agreed on, and the card holder advises that he wishes to use his card to make payment, the member of the sales personnel who has been contacted first ascertains the callers telephone number and then switches the circuitry 25 to connect the recorder 26 in circuit. The card holder then uses his telephone 33 to provide a sample of his speech which is recorded in the recorder 26, and positions the handset of his telephone on the acoustic coupler 31 to connect his card reader 30 to the recorder 26. The card holder passes his credit card 11 through the card reader 30 and thus the data on the card are transmitted to the recorder 26 where they are recorded. The call originated by the card holder is then terminated, thus clearing the telephone line 18 connecting the sales point location 17 to its local telephone exchange 16, and enabling the sales point personnel to put through a nor mal telephone call to the speech analyser station 14. When this connection is established, the sales point personnel play back the recording on the recorder 26, thus presenting to the station 14 both the card holder's speech sample and the data recorded on his credit card. As already explained, these data may be for example an actual voiceprint, or a coded analysis of a voiceprint, or an access code which serves to retrieve either of these from a store bank associated with the station 14. Whichever of these possibilities is employed in the system, the signals transmitted to the station [4 enable the required comparison to be made there so that the station 14 transmits the appropriate signal to the indicator 24 at the location 17, indicating (if such is the case) that the card holder who made the original call is indeed the authorised holder of the card which he then presented to his card reader.

Having obtained this authentication, the involved member of the sales point personnel telephones the card holders number, as previously ascertained, and thus re-establishes contact. He makes out the credit card companys slip for the sale in the normal manner, as though the card holder were there in person to sign it, and then presents the completed slip to the facsimile machine 27 for transmission to the card holder's facsimile machine 31. The necessary interconnection of the two machines is achieved by the card holder replacing his telephone handset on the acoustic coupler 31 and by the sales point personnel member setting his connecting circuitry 25 appropriately. Thus the machine 31 is caused to deliver to the card holder a facsimile of the slip which the sales point personnel member has completed. The card holder then immediately signs the facsimile he has received, and presents it (preferably with his credit card superimposed on a part of the slip left blank for the purpose) to the reader section of his machine 31, which causes the machine 27 at the sales point location 17 to produce a further facsimile, this time of the signed slip, This further facsimile, bearing a facsimile of the card holders signature (and preferably also of his credit card) may then be attached to the original (but unsigned) slip which was first completed, and the two documents together may be presented in the usual way to the card-issuing company, as debit notes against the account of the card holder.

In the foregoing description, the credit card utilisation systems disclosed by way of example have, for simplicity, been described as making use of independently existing telephone services as the necessary telecommunications links of the system. It will be apparent, however, that the way in which these links are provided is not basic to the invention. Clearly, the use of available existing services is preferable on grounds of cost and convenience if these are adequate for the demands of the system, but a credit card utilisation system ac cording to the invention may instead be entirely selfcontained, utilising its own private telecommunications links entirely. These may be effected for example either by land lines or by short-wave radio or by a combination of these and possibly other means, not excluding long-distance linkages via earth satellite. If the linkages used in the system are of sufficiently high grade, it may be preferred to provide each sales point location with television camera and transmission facilities and to make television receiving facilities available, perhaps optionally, to credit card holders. Then, a card holder wishing to order goods from a remote location, as described with reference to FIG. 4, can be shown, over the television link, those goods which he may wish to purchase. If he wishes to take time to consider his choice, of course, it is also possible for permanent pictures of the various goods available to be transmitted to him using the facsimile machine 27 at the sales point location and his own facsimile machine 31.

An embodiment of a card utilisation system which includes television facilities is illustrated in FIG. 5. As shown, a sales point location 17 is provided with an integrally built telecommunication unit 35. The unit 35 comprises: a push-button telephone unit of which the hand-set is referenced 22a and the push-button unit 22b, with ten buttons for the digits 9; a card reader of which card entry and exit slots 23a and 23b are shown; a tape recorder 26; a television camera 36 with lens 36a; a loudspeaker 37; an indicator unit 24 corresponding to the indicator unit 24 in FIG. 4; manual controls 38; and internal connection circuitry (not shown) which connects all the aforementioned to a transmission channel or channels 39 linking the unit 35 into a telecommunications network 40 which may be any suitable existing or specially provided network and is not further described here. Thus, the unit 35 includes a television camera and, in addition, all the items of equipment of the station 17 of FIG. 4 except the facsimile machine 27 thereof. ln the FIG. 5 embodiment, the facsimile machine 27 for the location 17 is provided as a separate unit, with its own integral acoustic coupler of which parts 27a and 27b are provided to receive the telephone handset 22a, thereby to couple the facsimile machine 27 into the circuitry of the unit 35.

Also linked to the network 40, by its own transmission channel or channels 41, is a card holders station 42 provided with a unit 35' which may be, to a large degree, identical with the unit 35. the station 42 includes a telephone comprising a handset 33a and push button unit 33b; a card reader with a card entry and exit slots a and 30b; a television receiver with a screen 36b replacing the television camera 36 of the unit a loudspeaker 37; manual controls 38", and a tape recorder 26. As at the location 17, a facsimile machine 31 is provided separately, with an integral acoustic coupler of which parts 31a and 31b co-operate with the telephone handset 33a (which may be placed upon them as shown in broken line) to couple the facsimile machine 31 into the circuitry of the unit 35'.

Each of many card-holder's stations, like the illustrated station 42, has access at will, through the network 40, to each of many sales point locations like the illustrated location 17, and each of these sales point locations also has access through the network 40 to the speech analyser station 14 which may also, as already described, include a memory store from which voiceprints can be called up in response to signals read from card holder's cards.

With sophisticated apparatus as above described, available at the stations 42, the card holder who has access to them may use his station not only for ordinary telephone use and for credit-sale transactions as above described, but also to gain access to, and to receive information from, any information banks, such as a bank 43, and other services which may be accessible via the network 40. The illustrated bank 43 may, for example, be a computerised microfilm library with selection and read-out means, capable of supplying requested information in a form adapted for presentation either on the television screen 36 of the station 42 or on the facsimile machine 31 thereof. lt will be understood that, with the fully integrated system described, payment for such information may be made by use of the card holder's credit card. Similarly, access may be had to any available computerised translation service and, again, payment may be made by use of the holder's credit card.

A particular case in which use may or may not be made of a separately existing telephone service is in connection with a pay television network. ln that case, of course, each television receiver in the network is usually connected by private land-lines to the central programme transmitting station; and these land-line connections may provide the means by which credit transactions of the kind already described are made by way of payment for programmes to be supplied. Each subscriber may have a telephone and a card reader, like the telephone 33 and card reader 30 of FIG. 4, these being connected or connectable to the transmitting station over the land line which is provided for carrying the programmes to his television receiver. He may then order a desired programme, and provide a sample ofhis speech by telephone, and then transmit his voice print by presenting his credit card to his card reader. With the order for a programme thus authenticated. the desired programme may be switched to his receiver and charged against his credit. The credit card may, similarly, be used for payment for use of a dial-asong scr vice, or for gaining access to movie programmes.

The foregoing descriptions of particular instances of ways in which credit-card utilisation systems according to the invention may be used are, of course, given by way of example only. Particularly in the case of a sophisticated system which provides for television com munication and the transmission of facsimile copies, the uses to which the system may be put are almost lim itless. In particular, as illustrated by the above description of a process of making a remote purchase, the parties involved may, even though remote from one an' other, deal with one another in complete security and in the knowledge that each can be supplied with full authentication of the transaction involved. It will be apparent that this advantageous characteristic of the credit cards and card utilisation systems according to the invention makes them ideal for financial transactions such as the issue and acknowledgement of instructions to banks or brokers. The provision of facsimile transmission not only enables payment to be authenticated as above described but also, when the purchase involves issue of a ticket or other document for subsequent use by the purchaser (as, for example, theatre and airline tickets, or cheques guaranteed by the issuing bank), enables the purchaser to be supplied with such documents without delay. In principle, of course, the facsimile apparatus may provide copies either in black and white or in full colour; and the same is true of the above described television facility. The use of cards and systems according to the invention as means of establishing or authenticating personal identities has already been referred to, and provides another example of an application of the invention.

It will be understood that, although the television facility provided in the system shown in FIG. 5 is a oneway facility only, the system illustrated may be modifled if desired to provide two-way television communicaton. Thus, the camera 36 of each unit 35 may be replaced by a television receiver like that of each of the units 35 and each unit 35 and 35' may be provided additionally with a television camera, either built-in or separate but electrically connected to the unit. The system then provides full two-way video-telephone facilities, in addition to the facilities already described.

If, as mentioned above, a card holder's station 42 includes a television camera facility, this can, of course, be used to transmit to any location 17, for presentation by the television receiver there on the screen thereof, a picture of the card holder and, simultaneously, of the card he holds. Particularly, in this case, the card may be one which bears a photograph of the authorised holder. thus providing an immediate visual check as an additional security measure.

It will be appreciated that each card holders station 42 comprising the unit 35' and the facsimile machine 31, is conceived as a portable station which the card holder can carry with him. Each unit 35' may incorporate an acoustic coupler of its own, so that it may be easily connected to any convenient existing telephone, Equally, a unit 35' may incorporate or be connectable to its own radio transmitter-receiver so that it may be used from remote locations to which no wired telephone system extends. In that case, it is preferred that the unit 35' should include its own power generator, and this (in view of recent developments in the design and power capabilities of solar cells), may be constituted by a panel of solar cells disposed, for example, on the top surface of the unit 35'.

Finally, mention should be made of one further specific use of the card utilisation systems described in the foregoing, namely to enable telephone calls (including video-telephone calls if the system includes television facilities), to be paid for by means of the credit card. Thus, for example in the system shown in FIG. 4, the telephone exchange 16 may itself include a sales-point location 17 at which the telephone operator can obtain authentication of a card holders identity and details of his account, as recorded with his voice-print on his card, so that the call which the card holder requires can be charged to the correct account with no possibility that the use of the card was fraudulent.

In the modification shown in Flg. 6, the unit 35 at the card holders station 42 has linked to it a television camera 44 so as to provide for two-way television as referred to above (it being assumed that the camera 36 of the unit 35 in FIG. 5 is replaced by a television receiver and that the unit 35 is similarly provided with a separate but linked camera like the camera 44). Additionally, the unit 35' includes a built-in camera 36" for the purpose of scanning and transmitting a picture of a credit card inserted into the unit 35'. To that end, the unit 35' in FIG. 6 has a differently oriented path for the inserted credit card. As shown, the entry slot 30a is so oriented that the inserted card is presented face-on to the camera 36". The exit slot for the card is not shown because it is on the unseen end of the unit 35' which is opposite to the end on which the handset 33a is provided. With this arrangement, a picture of an inserted credit card 11 or 12, like that of FIG. I or 2 but also bearing a picture of the authorised holder as shown in FIG. I, can be transmitted to any location 17 which has been called by means of the telephone 33a, 33b. The location 17 thus called may be, for example, a bank from which the calling card holder desires a guaranteed bank cheque for a specified amount. When the caller has called the bank and established his identity by means of his card, both visually and by means of the voiceprint record on it, the bank can issue the desired cheque by means of its facsimile machine, so that a facsimile guaranteed cheque 45 for the required amount is caused to issue, and thus be available for his use, from the card holder's facsimile machine 31 as shown.

It will be appreciated that the authorised holder of a credit card as described with reference to FIGS. 1, 2 or 7, may use it to have telephone calls charged to his own credit account whenever he makes a call from a telephone provided with means for reading the voiceprint and/or the picture on his card, whether this telephone is a public telephone or the telephone of a private subscriber.

FIGS. 8 and 8A show highly diagrammatically a card verification system embodying a card transport system.

A card which bears a magnetic recording of the authorised holder's voice is presented to the system at a card entry point and is transported at predetermined speed along a path which passes a magnetic cardreading head and thence to a discharge point at which the card is ejected. As the card passes the reading head or reading transducer, its magnetic track is scanned by the head which produces an output elelctrical signal or a group of electrical signals corresponding to the voiceprint. This signal is fed to a first magnetic recording head positioned in recording relationship with a first short closed loop of magnetic recording tape which is fed at constant speed past the recording head and on which, accordingly, the voiceprint is re-recorded.

The device further comprises a microphone or acoustical transducer connected to transmit a second group of electrical signals to a second magnetic recording head which is similarly associated with a second short closed loop of magnetic recording tape which is fed past it at constant speed, so as to record thereon a recording of the voice of a person speaking into the microphone. By this means, two recordings are obtained on the two closed loops of tape, and these two recordings can each be read repeatedly by respective ones of two tape-reading heads with which the device is provided, as the tape loops continue to be fed.

In this form the device is provided with a cathode ray system which is largely conventional in internal lay-out, the lay-out being similar to that of a conventional oscilloscope (see FIG. 8A). The system comprises two parallel arrays each involving a conventional electron fan followed by two pairs of opposed deflector plates. Two separate screens may be provided or, alternatively (as shown), a single screen on which the two traces are presented simultaneously along parallel axes for comparison therebetween. An output signal from each of the two tape-reading heads is fed for example to a corresponding pair of vertical deflector electrodes so as to provide two visible traces corresponding to the two recordings on the two tape loops.

It will be appreciated that the lengths and transport speeds of the tape loops may be such that the repetition frequency of the recordings thereon is synchronised with the scanning frequency of the oscilloscope traces; and even through this frequency will be low (of the order, say, of one per second), the oscilloscope(s) may be of the kind with a persistent-image screen such that this low frequency is adequate to provide steady images of the traces on the screen(s). Thus, the two voiceprints may be presented visually in close juxtaposition in which they can easily be compared visually. In this way, a person wishing to use his credit card and producing it to a sales assistant equipped with the above-described device, is enabled to establish by visible evidence that he is the authorised holder of the card. Additionally, or alternatively, the device may include electronic viewprint analyser means, to which are fed the signals from the microphone and from the card-reading head (either directly or from the above described first and second tape loops after they have been recorded thereon), and comparator circuits which will compare the two voiceprint analyses so obtained and will provide an indication that. as the case may be, the two voiceprints are, or are not, of the voice of one and the same person.

It willl be understood that other forms of the device will be different in many detailed respects. in particular, the voiceprint recorded on the card may be recorded in any of several different forms, and the device according to the present invention must, naturally, be compatible. Thus, if the card carries a numerical re cord of a voice-print analysis, the device must contain means for making such an analysis and expressing it in numerical form for comparison.

The device may be so arranged that insertion of the card through a slot (not shown), into a position in which it then remains at rest, is effective to switch on the device, including a transport means which moves the card reading head over the stationary card so as to scan it at predetermined speed. This is the exact reverse of the arrangement illustrated in FIG. 8.

Referring now to FIG. 9 of the drawings. a conventional microphone 101 is shown coupled to a conventional spectrum analyser and signal processor 102. The unit 102 is coupled to a conventional voiceprint plotter 103 (of the contour line type as described in Ref 1, which is itself coupled to a conventional comparator and command generator 105. The unit 105 is designed to compare the contour-line type of voiceprints and to initiate command functions. Attached to the comparator 105 is a credit card receptor 104 which enables the comparator to scan" the contour line type of voiceprint imprinted on the credit card. This scanning process is known to engineers versed in television tecnology as flying spot scanning", a process which is readily adapted for comparison of visibly represented patterns such as contour line maps. The voiceprint used is a mapping of this kind, as described in Ref. 1. When the credit card holder wishes to prove his identity or authorised holdership of the card, he inserts the credit card into the card receptor. The card receptor holds the card in a suitable position for electronic scanning. It is designed to retain the card in this position until released by a release command sent by the comparator upon satisfactory completion of the verification process. The credit card holder now speaks into the microphone, uttering the test phrase.

Since the card holder wishes to have his authenticity verified, he will co-operate" with the machine, pronouncing the appropriate test phrase clearly and using his normal speaking voice and speed. very reliable verification is thereby made possible, because the cooperative mode of operation permits the optimum decision thresholds to be set (see Ref. 2). in the basic form of the invention, the test phrase is converted to an electrical signal by the microphone and this electrical signal is fed into the spectrum analyser. The electrical signal is, of course, the electrical equivalent of the frequency and intensity patterns produced by the card holder's voice when speaking the test phrase. The spectrum analyser now extracts from this signal the significant measurements which, when fed to the voiceprint plotter, are translated into a contour line map representing the uniquely characteristic features of the test utterance, made by the credit card holder (see Ref. 1). The voiceprint so plotted in the form of a contour map may be displayed as a long-afterglow image on the face of a cathode ray oscilloscope (not shown). In this way, a means is provided for making a permanent record of the voiceprint by photographic means. An alarm signal set off by the comparator can be used, in turn, to trigger the photo-copy mechanism which makes a permanent record of the incoming voiceprint when the comparator I05 detects a fraudulent attempt. This can be of use for tracing and prosecuting an impostor who fraudulently tries to use someone elses credit card. The scanning and video signals which are generated for the visible display of a voiceprint on the face of a cathode ray tube can, of course, be used for direct electronic comparison of the video signals from the test utterance with the video signals from the flying spot scanner scanning the voiceprint on the credit card.

The comparator will operate at a suitable decision threshold, discriminating against differences between the reference voiceprint pattern on the credit card on the one hand and the test voiceprint pattern produced by the utterance spoken into the microphone on the other hand. If they match, the green light is switched on, via the line 110, and a card release command signal is conveyed via the card release command path 106 to the credit card receptor 104, which then allows the credit card to be withdrawn. For use at an attended vending station, the green light authorises the attendant to accept the credit card. For an unattended vending station, the goods release command path 107 is activated.

It is one of the objectives of the present invention to provide effective protection against fraud in connection with credit card operated automatic vending stations. Automatic registration and validation of credit and debit procedures by means of magnetically encoded charge codes, and credit information borne on the credit card, and linked to a specialised computer which automatically verifies and advances customer credit, is a method for automatic vending which will be rendered increasingly attractive by the elimination of fraudulent use of the credit card. Such a credit card would, of course, be particularly vulnerable to fraud without voiceprint verification. Special safeguards are provided by the present invention. In the case of attempted fraud, the comparator detects the disparity between the test utterance and the referencce voiceprint on the credit card, and the red STOP indicator-light is switched on via the line 109. Simultaneously, the alarm is sounded and the card release and goods release paths are blocked. The credit card is held inside the receptor and the goods are not released. in addition, a permanent record is made of the impostors voiceprint in response to the Permanent Record Command Path being activated by the comparator. Any of a number of known methods can be used for obtaining the permanent record, such as the combination of longafterglow cathode ray tubes with xerographic or photographic materials.

In practical applications, a variety of objectives have to be catered for and can be satisfied by the principles and methods of the present invention. When it is desirable to use a voiceprint credit card to carry information identifying the authorised card holder's credit account number, credit limit or credit balance, it can be an advantage to carry the voiceprint information in the form of a code or cipher other than a contour line voiceprint.

PREPARATION OF A SPECIAL CREDlT CARD One preferred alternative is to encode the identifying characteristics of the card holders voice in the form of a coded magnetic cipher. To improve the discrimination between impostor and authorised card holder, the voiceprint on the credit card is not merely produced by a single recording and transcription of a single utterance of the reference phrase, but by a multiple recording and reply process, so that the most typical" of several utterances is selected for the voiceprint to be put on the credit card. The criteria for selection of such a most typical" voiceprint are described in the literature (Ref. 2).

FIG. I of the accompanying drawings shows how the cipher or voiceprint is produced and imprinted. A microphone III is shown in conjunction with a con ventional recording and reply unit 112 such as, for instance, a magnetic tape machine. The unit 112 is in turn coupled to a signal analysis and processing unit 113 (as described in the above'noted bibliographical References, l, 2 and 3) in conjunction with a cipher en coder [M which may take one of several conventional forms. The encoder 114 operates in conjunction with a cipher printer and punch I which, typically, may be a conventional magnetic recording head combined with a suitable conventional tape-transport or card transport mechanism and card punch (not shown),

The mcrophone is provided for the reception of the utterance of a reference phrase spoken by the authorised person The microphone is linked directly or by telephone line or other suitable means to the recording equipment. The signal analysis and processing equipment is provided for the extraction of significant voice features from the utterance, played back by means of the playback part of the unit I12. ln simpler versions, the recording unit I12 can be omitted, when the microphone lll is directly connected to the signal analysis and processing unit 113. The signal analysis and processing unit 113, as described in the cited bibliographi' cal references, is used for producing signals in coded form. In a preferred embodiment, the numerical form is used in a suitable conventional code, designed to represent the distinguishing features of the speaker's utterance of the test phrase. It will be understood that, in any practical representation of a set of characteristics, the maximum feature content that can be represented by means of a given cipher, whether this is a fingerprint, contour line, voiceprint, photograph or numerical code, is limited by the information storage capacity of the chosen medium. All the carriers mentioned provide ample capacity for most practical applications of card verification. Numerical codes are particularly suitable for use in conjunction with known automatic information processing, pattern recognition and feature comparison techniques, and should therefore be regarded as a preferred means.

The signal analysis and processing equipment 113 is arranged to produce its output in a coded form for transmission to the cipher encoder 114. These processing and selection routines can be understood by study of the cited references. The cipher encoder 114 specifically serves:

a. to combine the voiceprint signal with a charge code signal; and

b. to convert the processed signal into a suitable form for imprinting on the credit card.

The first of these purposes, namely, the combination of the voiceprint signal with the charge code, safeguards the credit card further against fraud. Supposing a credit card were strolen, and the thief transplanted" a voiceprint from his own credit card onto the stolen credit card, he might then try to use the stolen card in certain circumstances. However, the present invention provides for a means whereby this fraud is prevented as follows. The voiceprint reference signal is combined with the charge code, and the combination is used for verification. Thus, the cipher fraudulently transferred to the stolen card would bear the impostors charge code and therefore not gain admission to the original credit facility of the stolen card.

Credit cards normally contain a charge code in readable form, and this usually takes the shape of ordinary numerals. This code can therefore be utilised for use in corroborating the charge code integrity of the voiceprint verification cipher. In a preferred embodiment of this principle, the charge code is represented on the credit card in three forms:

a. in the normal legible form, using visible numerals;

b. in a code represented by punched holes in the credit card (or by a magnetic cipher); and

in a code embedded in, and combined with, the

voiceprint cipher which the credit card bears.

The code (a) and, if desirable, the code (b) serve the normal charge code purposes. The codes (b) and (c) are used in combination to verify the integrity of the card, i.e. to ensure that fraudulent transplants" of the voiceprint section are easily detected.

The punched holes are preferably situated within the area used for the readable charge code on the credit card. These and combined voice and charge code cipher are put onto the credit card by the cipher printer and punch 115. After recording of this cipher and punching of these holes, the card is ready for use. It is seen to contain three sets of information represented in numerical codes:

A. a magnetically encoded number representing the voiceprint;

B. a magnetically encoded number representing the charge code; and

C. a punched hole encoded number representing the charge code.

It will be remembered that the codes A and B are combined into a single magnetic cipher.

VERIFICATION EQUIPMENT AND METHOD FIG. II is a schematic diagram of the equipment for verification of credit card holder identity, generally intended for use at the point of sale, or of card holder verification. A credit card receptor is provided, containing conventional means for reading the punched hold charge code and the reading the magnetically encoded cipher, which is a combination of the voice cipher and the charge code cipher, The two readouts read off the credit card are represented by a first group of signals which are fed into the code separator, and there, conventional means are used for separating the first group of signals into first and second portions, wherein the first portion represents the voiceprint cipher and the second portion represents the charge code cipher. In other words, the conventional means separates the voiceprint cipher from the charge code cipher. The voiceprint cipher, the charge code cipher and the charge code information derived from the punched holes are then decoded by conventional means, i.e. processed by the Code Separator and Decoder 12]. This renders them in suitable form for comparison by the comparators 122 and 126. Having inserted the card in the Credit Card Receptor 120, the

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US2416353 *Feb 6, 1945Feb 25, 1947Shipman BarryMeans for visually comparing sound effects during the production thereof
US3412493 *May 2, 1966Nov 26, 1968IbmTamper-proof record structure
US3466394 *May 2, 1966Sep 9, 1969IbmVoice verification system
US3525811 *Dec 26, 1968Aug 25, 1970Alvaro GarciaRemote control voting system
US3559175 *Oct 23, 1967Jan 26, 1971Ivan Dwayne PomeroyCredit card system
US3594727 *Apr 16, 1968Jul 20, 1971Edward L BraunCredit card banking system
US3673331 *Jan 19, 1970Jun 27, 1972Texas Instruments IncIdentity verification by voice signals in the frequency domain
US3688088 *Sep 18, 1970Aug 29, 1972Texaco IncCredit card validation system using an opaque card having translucent coded areas
US3700815 *Apr 20, 1971Oct 24, 1972Bell Telephone Labor IncAutomatic speaker verification by non-linear time alignment of acoustic parameters
US3723655 *Feb 16, 1971Mar 27, 1973Pitney Bowes IncCredit authorization system terminal
US3742451 *Apr 13, 1971Jun 26, 1973Valcometric CorpCredit sales system
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US4054749 *Nov 29, 1976Oct 18, 1977Fuji Xerox Co., Ltd.Method for verifying identity or difference by voice
US4653097 *May 23, 1986Mar 24, 1987Tokyo Shibaura Denki Kabushiki KaishaIndividual verification apparatus
US4752676 *Dec 12, 1985Jun 21, 1988Common Bond AssociatesReliable secure, updatable "cash" card system
US4757541 *Dec 1, 1986Jul 12, 1988Research Triangle InstituteAudio visual speech recognition
US4827518 *Aug 6, 1987May 2, 1989Bell Communications Research, Inc.Speaker verification system using integrated circuit cards
US4876717 *Jun 3, 1988Oct 24, 1989American Telephone And Telegraph CompanyAdjunct processor for providing computer facility access protection via call transfer
US4879747 *Mar 21, 1988Nov 7, 1989Leighton Frank TMethod and system for personal identification
US4900902 *Dec 16, 1986Feb 13, 1990Canon Kabushiki KaishaData communication apparatus
US4902881 *Jun 10, 1988Feb 20, 1990Faxplus CorporationParallel process communications terminal and network
US4993068 *Nov 27, 1989Feb 12, 1991Motorola, Inc.Unforgeable personal identification system
US4995081 *Nov 6, 1989Feb 19, 1991Leighton Frank TMethod and system for personal identification using proofs of legitimacy
US4996161 *Oct 16, 1987Feb 26, 1991Guardian Technologies, Inc.Breath alcohol testing system
US5023901 *Aug 22, 1988Jun 11, 1991Vorec CorporationSurveillance system having a voice verification unit
US5055658 *Apr 23, 1990Oct 8, 1991Cockburn John BSecurity system employing digitized personal physical characteristics
US5091713 *May 10, 1990Feb 25, 1992Universal Automated Systems, Inc.Inventory, cash, security, and maintenance control apparatus and method for a plurality of remote vending machines
US5127043 *May 15, 1990Jun 30, 1992Vcs Industries, Inc.Simultaneous speaker-independent voice recognition and verification over a telephone network
US5170426 *Sep 12, 1991Dec 8, 1992Bell Atlantic Network Services, Inc.Method and system for home incarceration
US5187352 *Oct 15, 1990Feb 16, 1993William BlairMicroprocessor controlled security system for computers
US5216720 *Apr 23, 1991Jun 1, 1993Texas Instruments IncorporatedVoice verification circuit for validating the identity of telephone calling card customers
US5222138 *Aug 6, 1992Jun 22, 1993Balabon Sam DRemote signature rendering system & apparatus
US5297194 *Jun 22, 1992Mar 22, 1994Vcs Industries, Inc.Simultaneous speaker-independent voice recognition and verification over a telephone network
US5313556 *Feb 26, 1993May 17, 1994Seaway Technologies, Inc.Acoustic method and apparatus for identifying human sonic sources
US5365574 *Nov 25, 1992Nov 15, 1994Vcs Industries, Inc.Telephone network voice recognition and verification using selectively-adjustable signal thresholds
US5450477 *Dec 27, 1993Sep 12, 1995At&T Corp.Monitoring of charges debited to an account having an assigned limit
US5497446 *Dec 29, 1993Mar 5, 1996Canon Kabushiki KaishaSpeech information processing method and apparatus connectable to a public line
US5499288 *Mar 22, 1994Mar 12, 1996Voice Control Systems, Inc.Simultaneous voice recognition and verification to allow access to telephone network services
US5517558 *Sep 21, 1993May 14, 1996Voice Control Systems, Inc.Voice-controlled account access over a telephone network
US5541925 *Mar 27, 1995Jul 30, 1996Compuserve IncorporatedPoint of sale system that bypasses the public telephone network
US5544228 *Sep 27, 1993Aug 6, 1996The Walt Disney CompanyMethod and apparatus for transmission of full frequency digital audio
US5546462 *Sep 9, 1994Aug 13, 1996Washington UniversityMethod and apparatus for fingerprinting and authenticating various magnetic media
US5548647 *Apr 3, 1987Aug 20, 1996Texas Instruments IncorporatedFixed text speaker verification method and apparatus
US5583933 *Aug 5, 1994Dec 10, 1996Mark; Andrew R.Method and apparatus for the secure communication of data
US5592377 *Mar 9, 1995Jan 7, 1997Lipkin; Edward B.Check cashing system
US5621539 *Jul 31, 1996Apr 15, 1997At&TPublic fax services and system
US5623539 *Jan 27, 1994Apr 22, 1997Lucent Technologies Inc.Using voice signal analysis to identify authorized users of a telephone system
US5636282 *Jun 20, 1994Jun 3, 1997Paradyne CorporationMethod for dial-in access security using a multimedia modem
US5696880 *Jun 26, 1995Dec 9, 1997Motorola, Inc.Communication system user authentication method
US5732133 *Jun 7, 1996Mar 24, 1998Smart Tone Authentication, Inc.System and method for selecting and generating telephone access numbers for limiting access to a telephone service
US5740244 *May 7, 1996Apr 14, 1998Washington UniversityMethod and apparatus for improved fingerprinting and authenticating various magnetic media
US5745555 *Jun 7, 1996Apr 28, 1998Smart Tone Authentication, Inc.System and method using personal identification numbers and associated prompts for controlling unauthorized use of a security device and unauthorized access to a resource
US5818608 *Jul 7, 1995Oct 6, 1998Matsushita Electric Industrial Co., Ltd.Quick response facsimile apparatus
US5818930 *Jun 7, 1996Oct 6, 1998Smart Tone Authentication, Inc.Auto-dialer housing
US5825871 *Jun 7, 1996Oct 20, 1998Smart Tone Authentication, Inc.Information storage device for storing personal identification information
US5835894 *Feb 14, 1997Nov 10, 1998Ann Adcock CorporationSpeaker and command verification method
US5907597 *Feb 23, 1996May 25, 1999Smart Tone Authentication, Inc.Method and system for the secure communication of data
US5920628 *Jan 9, 1997Jul 6, 1999Washington UniversityMethod and apparatus for fingerprinting and authenticating various magnetic media
US5940187 *Jan 6, 1997Aug 17, 1999Bellsouth CorporationMethod for certifying facsimile communications over a telephone network
US5949874 *Nov 25, 1997Sep 7, 1999Smart Tone Authentication, Inc.Method and system for compensating for signal deviations in tone signals over a transmission channel
US5953700 *Jun 11, 1997Sep 14, 1999International Business Machines CorporationPortable acoustic interface for remote access to automatic speech/speaker recognition server
US6014441 *Nov 25, 1997Jan 11, 2000Smart Tone Authentication, Inc.Method and system for generation of tone signals over a transmission channel
US6028926 *Sep 23, 1997Feb 22, 2000Henderson; Daniel A.Dialer programming system and device with integrated printing process
US6028950 *Feb 10, 1999Feb 22, 2000The National Registry, Inc.Fingerprint controlled set-top box
US6038553 *Sep 19, 1997Mar 14, 2000Affiliated Computer Services, Inc.Self service method of and system for cashing checks
US6045039 *Oct 16, 1997Apr 4, 2000Mr. Payroll CorporationCardless automated teller transactions
US6062474 *Oct 2, 1997May 16, 2000Kroll; Mark WilliamATM signature security system
US6122612 *Nov 20, 1997Sep 19, 2000At&T CorpCheck-sum based method and apparatus for performing speech recognition
US6137863 *Dec 13, 1996Oct 24, 2000At&T Corp.Statistical database correction of alphanumeric account numbers for speech recognition and touch-tone recognition
US6141661 *Oct 17, 1997Oct 31, 2000At&T CorpMethod and apparatus for performing a grammar-pruning operation
US6145738 *May 12, 1997Nov 14, 2000Mr. Payroll CorporationMethod and apparatus for automatic check cashing
US6148105 *Apr 22, 1999Nov 14, 2000Hitachi, Ltd.Character recognizing and translating system and voice recognizing and translating system
US6149056 *May 12, 1997Nov 21, 2000Mr. Payroll CorporationAutomatic check cashing using biometric identification verification
US6154579 *Aug 11, 1997Nov 28, 2000At&T Corp.Confusion matrix based method and system for correcting misrecognized words appearing in documents generated by an optical character recognition technique
US6185536 *Mar 4, 1998Feb 6, 2001Motorola, Inc.System and method for establishing a communication link using user-specific voice data parameters as a user discriminator
US6199044 *May 27, 1998Mar 6, 2001Intermec Ip Corp.Universal data input and processing device, such as universal point-of-sale device for inputting and processing bar code symbols, document images, and other data
US6205428Nov 20, 1997Mar 20, 2001At&T Corp.Confusion set-base method and apparatus for pruning a predetermined arrangement of indexed identifiers
US6219453Aug 11, 1997Apr 17, 2001At&T Corp.Method and apparatus for performing an automatic correction of misrecognized words produced by an optical character recognition technique by using a Hidden Markov Model based algorithm
US6223158Feb 4, 1998Apr 24, 2001At&T CorporationStatistical option generator for alpha-numeric pre-database speech recognition correction
US6227447May 10, 1999May 8, 2001First Usa Bank, NaCardless payment system
US6286756Feb 28, 2000Sep 11, 2001Innoventry CorporationCardless automated teller transactions
US6292437 *Dec 9, 1997Sep 18, 2001Intermec Ip Corp.Portable identification capture system for transaction verification
US6341724Jan 11, 2001Jan 29, 2002First Usa Bank, NaCardless payment system
US6396919 *Mar 20, 1997May 28, 2002Fujitsu LimitedTelephone transaction support system and telephone call connection control system
US6400805Jun 15, 1998Jun 4, 2002At&T Corp.Statistical database correction of alphanumeric identifiers for speech recognition and touch-tone recognition
US6405922May 15, 2000Jun 18, 2002Kroll Family TrustKeyboard signature security system
US6498847Feb 9, 2000Dec 24, 2002Daniel A. HendersonDialer programming and device with integrated printing process
US6519565Nov 10, 2000Feb 11, 2003Voice Security Systems, Inc.Method of comparing utterances for security control
US6527638 *Dec 12, 1996Mar 4, 2003Walker Digital, LlcSecure improved remote gaming system
US6615171 *Aug 13, 1999Sep 2, 2003International Business Machines CorporationPortable acoustic interface for remote access to automatic speech/speaker recognition server
US6690673Aug 20, 1999Feb 10, 2004Jeffeerson J. JarvisMethod and apparatus for a biometric transponder based activity management system
US6690831 *Jul 13, 1999Feb 10, 2004Sony CorporationEncoding device and encoding method, decoding device and decoding method, information processing device and information processing method as well as a medium
US6695204Mar 17, 2000Feb 24, 2004Atc Realty Fifteen, Inc.Method and apparatus for automatic check cashing
US6732113Sep 20, 2000May 4, 2004Verispan, L.L.C.System and method for generating de-identified health care data
US6786398Feb 28, 2000Sep 7, 2004Atc Realty Fifteen, Inc.Method and apparatus for automatic cashing of a negotiable instrument
US6792334 *Apr 17, 2001Sep 14, 2004Chesterfield Holdings, LlcVending machine for vending age-restricted products using an authorization card and associated methods
US6813619Mar 30, 2001Nov 2, 2004Koninklijke Philips Electronics N.V.Storing and using personal profile from the remote
US6817520Jun 10, 2002Nov 16, 2004Kroll Family TrustMagnetic card swipe signature security system
US6856965Jun 28, 1999Feb 15, 2005Atc Realty Fifteen, Inc.Method and apparatus for automatic check cashing
US6867789Jun 20, 2000Mar 15, 2005Bank One, Delaware, National AssociationSystem and method for generating graphical user interfaces
US6934849Jul 13, 2001Aug 23, 2005Voice, Trust AgMethod and system for authorizing a commercial transaction
US6935952Oct 17, 2002Aug 30, 2005Walker Digital, LlcMethod and apparatus for remote gaming
US6965697Aug 10, 2000Nov 15, 2005Sony CorporationCoding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
US6978238 *Jul 12, 1999Dec 20, 2005Charles Schwab & Co., Inc.Method and system for identifying a user by voice
US7058817Jun 30, 2000Jun 6, 2006The Chase Manhattan BankSystem and method for single sign on process for websites with multiple applications and services
US7099850Sep 21, 2001Aug 29, 2006Jpmorgan Chase Bank, N.A.Methods for providing cardless payment
US7103576Sep 21, 2001Sep 5, 2006First Usa Bank, NaSystem for providing cardless payment
US7130452 *Dec 3, 2002Oct 31, 2006International Business Machines CorporationSystem and method for multi-party validation, authentication and/or authorization via biometrics
US7143174Jun 12, 2002Nov 28, 2006The Jpmorgan Chase Bank, N.A.Method and system for delayed cookie transmission in a client-server architecture
US7152045Sep 10, 2002Dec 19, 2006Indivos CorporationTokenless identification system for authorization of electronic transactions and electronic transmissions
US7155614Feb 9, 2006Dec 26, 2006Kimberly EllmoreSystem and method for single sign on process for websites with multiples applications and services
US7203663Jun 20, 2000Apr 10, 2007Jpmorgan Chase Bank, N.A.System and method for converting information on paper forms to electronic data
US7246263Sep 19, 2001Jul 17, 2007Jpmorgan Chase BankSystem and method for portal infrastructure tracking
US7246324May 23, 2002Jul 17, 2007Jpmorgan Chase BankMethod and system for data capture with hidden applets
US7266839Jul 12, 2001Sep 4, 2007J P Morgan Chase BankSystem and method for providing discriminated content to network users
US7321864Nov 3, 2000Jan 22, 2008Jpmorgan Chase Bank, N.A.System and method for providing funding approval associated with a project based on a document collection
US7353383Mar 14, 2003Apr 1, 2008Jpmorgan Chase Bank, N.A.System and method for single session sign-on with cryptography
US7360694 *Jan 23, 2004Apr 22, 2008Mastercard International IncorporatedSystem and method for secure telephone and computer transactions using voice authentication
US7376677Mar 15, 2004May 20, 2008Verispan, L.L.C.System and method for generating de-identified health care data
US7376838Oct 7, 2003May 20, 2008Jp Morgan Chase BankMethod for controlled and audited access to privileged accounts on computer systems
US7392386Jan 28, 2004Jun 24, 2008J P Morgan Chase BankSetuid-filter method for providing secure access to a credentials store for computer systems
US7421696Feb 17, 2004Sep 2, 2008Jp Morgan Chase BankMethods and systems for managing successful completion of a network of processes
US7426530Jun 12, 2000Sep 16, 2008Jpmorgan Chase Bank, N.A.System and method for providing customers with seamless entry to a remote server
US7430537Jul 10, 2001Sep 30, 2008Paypal, Inc.System and method for verifying a financial instrument
US7444672Feb 9, 2006Oct 28, 2008Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US7461265Feb 9, 2006Dec 2, 2008Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US7472171Jun 21, 2002Dec 30, 2008Jpmorgan Chase Bank, National AssociationMethod and system for determining receipt of a delayed cookie in a client-server architecture
US7593876Dec 18, 2003Sep 22, 2009Jp Morgan Chase BankSystem and method for processing partially unstructured data
US7630899Sep 7, 2006Dec 8, 2009At&T Intellectual Property Ii, L.P.Concise dynamic grammars using N-best selection
US7685013Aug 24, 2007Mar 23, 2010Jpmorgan Chase BankSystem and method for automatic financial project management
US7689504Oct 31, 2002Mar 30, 2010Jpmorgan Chase Bank, N.A.System and method for establishing or modifying an account with user selectable terms
US7738711May 20, 2005Jun 15, 2010Sony CorporationCoding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
US7747866Aug 24, 2000Jun 29, 2010Jpmorgan Chase Bank, N.A.System and method providing improved error detection related to transmission of data over a communication link
US7756816Oct 12, 2005Jul 13, 2010Jpmorgan Chase Bank, N.A.System and method for network-based project management
US7783578Jan 25, 2006Aug 24, 2010Jpmorgan Chase Bank, N.A.System for providing cardless payment
US7792522Jan 16, 2007Sep 7, 2010Positive Access CorporationSoftware key control for mobile devices
US7810134Jan 22, 2007Oct 5, 2010First Data CorporationAuthentication system for financial transactions
US7865376Dec 11, 2007Jan 4, 2011Sdi Health LlcSystem and method for generating de-identified health care data
US7917436Oct 30, 2007Mar 29, 2011At&T Intellectual Property I, L.P.Internet billing method
US7937260Jun 15, 1998May 3, 2011At&T Intellectual Property Ii, L.P.Concise dynamic grammars using N-best selection
US7941533Feb 19, 2002May 10, 2011Jpmorgan Chase Bank, N.A.System and method for single sign-on session management without central server
US7966496Dec 22, 2006Jun 21, 2011Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US7987501Dec 21, 2001Jul 26, 2011Jpmorgan Chase Bank, N.A.System and method for single session sign-on
US8024260Jun 9, 2000Sep 20, 2011Paypal Inc.Method for transmitting a code
US8086532Feb 21, 2011Dec 27, 2011At&T Intellectual Property I, L.P.Internet billing method
US8116436 *Feb 24, 2005Feb 14, 2012Grape Technology Group, Inc.Technique for verifying identities of users of a communications service by voiceprints
US8139723 *Jun 16, 2006Mar 20, 2012International Business Machines CorporationVoice authentication system and method using a removable voice ID card
US8145522Nov 8, 2006Mar 27, 2012Jpmorgan Chase Bank, N.A.System and method for establishing or modifying an account with user selectable terms
US8160960Dec 11, 2009Apr 17, 2012Jpmorgan Chase Bank, N.A.System and method for rapid updating of credit information
US8185877Jun 22, 2005May 22, 2012Jpmorgan Chase Bank, N.A.System and method for testing applications
US8185940Jul 17, 2007May 22, 2012Jpmorgan Chase Bank, N.A.System and method for providing discriminated content to network users
US8190893Jul 1, 2004May 29, 2012Jp Morgan Chase BankPortable security transaction protocol
US8296204Aug 26, 2008Oct 23, 2012Paypal Inc.System and method for reducing RIKS associated with accepting a financial instrument
US8301493Nov 5, 2002Oct 30, 2012Jpmorgan Chase Bank, N.A.System and method for providing incentives to consumers to share information
US8301556Sep 19, 2011Oct 30, 2012Paypal Inc.Method for transmitting a code
US8321682Jan 26, 2009Nov 27, 2012Jpmorgan Chase Bank, N.A.System and method for generating and managing administrator passwords
US8335855May 18, 2007Dec 18, 2012Jpmorgan Chase Bank, N.A.System and method for portal infrastructure tracking
US8370259Nov 8, 2011Feb 5, 2013Ebay, Inc.Verifying the source of electronically exchanged value
US8417637Nov 8, 2011Apr 9, 2013Paypal Inc.Approving the use of the source of funds
US8438086Nov 28, 2001May 7, 2013Jpmorgan Chase Bank, N.A.System and method for providing customers with seamless entry to a remote server
US8458070Jun 15, 2012Jun 4, 2013Jpmorgan Chase Bank, N.A.System and method for providing customers with seamless entry to a remote server
US8473452Sep 20, 2000Jun 25, 2013Ims Health IncorporatedSystem and method for analyzing de-identified health care data
US8473735May 19, 2008Jun 25, 2013Jpmorgan ChaseSystems and methods for managing digital certificates
US8515871Nov 8, 2011Aug 20, 2013Paypal Inc.Authorizing use of a financial instrument
US8532640Jul 28, 2010Sep 10, 2013Positive Access CorporationSoftware key control for mobile devices
US8549315Sep 14, 2012Oct 1, 2013Jpmorgan Chase Bank, N.A.System and method for generating and managing administrator passwords
US8555358Mar 7, 2008Oct 8, 2013Mastercard International IncorporatedSystem and method for secure telephone and computer transactions using voice authentication
US8571975Nov 24, 1999Oct 29, 2013Jpmorgan Chase Bank, N.A.System and method for sending money via E-mail over the internet
US8583926Apr 26, 2006Nov 12, 2013Jpmorgan Chase Bank, N.A.System and method for anti-phishing authentication
US8590008Oct 30, 2008Nov 19, 2013Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US8600878Sep 13, 2012Dec 3, 2013Ebay Inc.Method for transmitting a code
US8630391Mar 2, 2012Jan 14, 2014International Business Machines CorporationVoice authentication system and method using a removable voice ID card
US8636203 *Dec 4, 2006Jan 28, 2014Visa U.S.A. Inc.Partial authorization of a financial transaction
US8682665Apr 28, 2011Mar 25, 2014At&T Intellectual Property Ii, L.P.Concise dynamic grammars using N-best selection
US8726011May 17, 2013May 13, 2014Jpmorgan Chase Bank, N.A.Systems and methods for managing digital certificates
US8732072Mar 16, 2010May 20, 2014Jpmorgan Chase Bank, N.A.System and method for establishing or modifying an account with user selectable terms
US8793490Dec 13, 2006Jul 29, 2014Jpmorgan Chase Bank, N.A.Systems and methods for multifactor authentication
US8849716Sep 14, 2007Sep 30, 2014Jpmorgan Chase Bank, N.A.System and method for preventing identity theft or misuse by restricting access
US8909551 *Mar 15, 2013Dec 9, 2014Paul PawlusiakSystem and method of expedited credit and loan processing
US8930404Jun 24, 2013Jan 6, 2015Ims Health IncorporatedSystem and method for analyzing de-identified health care data
US20120330663 *Aug 11, 2011Dec 27, 2012Hon Hai Precision Industry Co., Ltd.Identity authentication system and method
US20130218752 *Mar 15, 2013Aug 22, 2013Paul PawlusiakSystem and method of expedited credit and loan processing
USRE35336 *Aug 14, 1992Sep 24, 1996Casi-Rusco, Inc.Self-contained programmable terminal for security systems
CN1905445BJul 27, 2005Feb 15, 2012国际商业机器公司使用可移动的语音标识卡的语音认证系统及语音认证方法
EP0101772A1 *Sep 1, 1982Mar 7, 1984Jerome Hal LemelsonComputer security systems
EP0102109A1 *Jul 29, 1983Mar 7, 1984Philips Electronics N.V.Programmable system for executing voice commands, and execution station, programming station, and key element for use in such a system
EP0271835A2 *Dec 11, 1987Jun 22, 1988Hitachi, Ltd.Personal voice pattern carrying card system
EP0432123A2 *Dec 5, 1990Jun 12, 1991Modul-Elektronik AbImprovements in and relating to pay machines
EP0589184A2 *Aug 2, 1993Mar 30, 1994Robert Bosch GmbhMethod for verifying the identity of the owner of a chip card, especially a credit card
EP1172770A1 *Jul 10, 2000Jan 16, 2002Michael KramerMethod and system for verifying a party of a business transaction
EP1172771A1 *Jul 14, 2000Jan 16, 2002Michael KramerProcess and system for authorising a commercial transaction
EP1675070A2 *Jul 14, 2000Jun 28, 2006Voice.Trust AgMethod and system for authorising a commercial transaction
EP1980967A2 *Feb 28, 2001Oct 15, 2008Kabushiki Kaisha EightingIndividual certification method using musical sound data
WO1986006197A1 *Mar 10, 1986Oct 23, 1986Drexler TechData card system for initializing spoken-word recognition units
WO1986007480A1 *Jun 10, 1986Dec 18, 1986Media Net LtdMethod and apparatus for preparing a check, money order or credit card
WO1991018386A1 *May 14, 1991Nov 28, 1991Vcs Ind Inc D B A Voice ControSimultaneous speaker-independent voice recognition and verification over a telephone network
WO1992015090A1 *Feb 21, 1992Sep 3, 1992Jorge M ParraAcoustic method and apparatus for identifying human sonic sources
WO1994012973A1 *Nov 24, 1993Jun 9, 1994Vcs Ind IncTelephone network voice recognition and verification using selectively-adjustable signal thresholds
WO1995008821A1 *Sep 21, 1994Mar 30, 1995Vcs Ind IncVoice-controlled account access over a telephone network
WO1996018169A1 *Dec 1, 1995Jun 13, 1996Victoria DavisTransaction verification apparatus & method
WO1996022595A1 *Jan 18, 1996Jul 25, 1996Ann Adcock CorpSpeaker verification method
WO1998030983A2Jan 5, 1998Jul 16, 1998Bellsouth CorpSystem for delivering certified facsimile messages
WO1999022362A1 *Oct 26, 1998May 6, 1999Enco Tone LtdNon-transferable bio-metric token-based identification methods and devices
WO2000028524A1 *Nov 10, 1998May 18, 2000Sherrie Ann AdcockMethod of comparing utterances for security control
WO2002007107A2 *Jul 13, 2001Jan 24, 2002Michael KramerMethod and system for authorizing a commercial transaction
U.S. Classification379/114.19, 379/93.3, 379/91.1, 902/23, 704/E17.3, 902/22, 902/3
International ClassificationG11B5/80, G10L17/00, G07C9/00, B42D15/10, G07F7/10
Cooperative ClassificationG07F7/1075, G10L17/005, G06Q20/347, G07F7/10, G07C9/00087
European ClassificationG07F7/10P8, G06Q20/347, G07C9/00B6D4, G10L17/00U, G07F7/10